Thao Pham
Deakin University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Thao Pham.
international multi topic conference | 2004
Morshed U. Chowdhury; Dharani Priyahansika Perera; Thao Pham
Mobile ad-hoc networks are characterised by constant topology changes, the absence of fixed infrastructure and lack of any centralised control. Traditional routing algorithms prove to be inefficient in such a changing environment. Ad-hoc routing protocols such as dynamic source routing (DSR), ad-hoc on-demand distance vector routing (AODV) and destination-sequence distance vector (DSDV) have been proposed to solve the multi hop routing problem in ad-hoc networks. Performance studies of these routing protocols have assumed constant bit rate (CBR) traffic. Real-time multimedia traffic generated by video-on demand and teleconferencing services are mostly variable bit rate (VBR) traffic. Most of these multimedia traffic is encoded using the MPEG standard. (ISO moving picture expert group). When video traffic is transferred over MANETs a series of performance issues arise. In this paper we present a performance comparison of three ad-hoc routing protocols - DSR, AODV and DSDV when streaming MPEG4 traffic. Simulation studies show that DSDV performs better than AODV and DSR. However all three protocols fail to provide good performance in large, highly mobile network environments. Further study is required to improve the performance of these protocols in mobile ad-hoc networks offering VBR services.
international conference on information technology | 2010
Ray Biplob; Morshed U. Chowdhury; Thao Pham
Radio Frequency Identification (RFID) system is a remote identification technology which is taking the place of barcodes to become electronic tags of an object. However, its radio transmission nature is making it vulnerable in terms of security. Recently, research proposed that an RFID tag can contain malicious code which might spread viruses, worms and other exploits to middleware and back-end systems. This paper is proposing a framework which will provide protection from malware and ensure the data privacy of a tag. The framework will use a sanitization technique with a mutual authentication in the reader level. This will ensure that any malicious code in the tag is identified. If the tag is infected by malicious code it will stop execution of the code in the RFIF system. Here shared unique parameters are used for authentication. It will be capable of protecting an RFID system from denial of service (DOS) attack, forward security and rogue reader better than existing protocols. The framework is introducing a layer concept on a smart reader to reduce coupling between different tasks. Using this framework, the RFID system will be protected from malware and also the privacy of the tag will be ensured.
computer science and software engineering | 2003
Morshed U. Chowdhury; Y. Tu; Thao Pham
Proceedings of the International Conference on Cognition and Recognition, 22-23 December 2005 | 2005
Nazmul Haque; Morshed U. Chowdhury; Thao Pham
computer applications in industry and engineering | 2004
Morshed U. Chowdhury; Sid Ray; Thao Pham
international conference on advances in pattern recognition | 2003
Morshed U. Chowdhury; Siddheswar Ray; Thao Pham
computer science and software engineering | 2003
Morshed U. Chowdhury; Siddheswar Ray; Thao Pham
computer applications in industry and engineering | 2003
Morshed U. Chowdhury; Yiqing Tu; Thao Pham
computer applications in industry and engineering | 2003
S. Subramanya; Morshed U. Chowdhury; Thao Pham; Sanjay Shankar
international conference on computer science and information technology | 2002
Morshed U. Chowdhury; Siddheswar Ray; Thao Pham